[1] |
LU Chen.Network traffic analysis using stochastic grammars[EB/OL].[2018-03-11].https://search.proquest.com/docview/1284939775.
|
[2] |
MODI C,PATEL D,BORISANIYA B,et al.A survey of intrusion detection techniques in cloud[J].Journal of Network and Computer Applications,2013,36(1):42-57.
|
[3] |
SCHIAVONI S,MAGGI F,CAVALLARO L,et al.Phoenix:DGA-based botnet tracking and intelligence[C]//Proceedings of International Conference on Detection of Intrusions and Malware,and Vulnerability Assessment.Berlin,Germany:Springer,2014:192-211.
|
[4] |
TAYLOR V F,SPOLAOR R,CONTI M,et al.Robust smartphone App identification via encrypted network traffic analysis[J].IEEE Transactions on Information Forensics and Security,2017,PP(99):1-10.
|
[5] |
MUEHLSTEIN J,ZION Y,BAHUMI M,et al.Analyzing https encrypted traffic to identify user operating system[EB/OL].[2018-03-11].https://arxiv.org/abs/1603.04865v2.
|
[6] |
陈瑞东,赵凌园,张小松.基于模糊聚类的僵尸网络识别技术[J].计算机工程,2018,44(10):46-50.
|
[7] |
LAMPRAKIS P,DARGENIO R,GUGELMANN D,et al.Unsupervised detection of APT C&C channels using Web request graphs[C]//Proceedings of International Conference on Detection of Intrusions and Malware,and Vulnerability Assessment.Berlin,Germany:Springer,2017:366-387.
|
[8] |
CABAJ K,GREGORCZYK M,MAZURCZYK W.Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics[EB/OL].[2018-03-11].https://arxiv.org/abs/1611.08294.
|
[9] |
安全客.恶意勒索软件teslacrypt分析[EB/OL].[2018-03-11].https://bbs.360.cn/thread-14700070-1-1.html.
|
[10] |
MIKOLOV T,CHEN K,CORRADO G,et al.Efficient estimation of word representations in vector space[EB/OL].[2018-03-11].https://www.researchgate.net/publication/234131319_Efficient_Estimation_of_Word_Representations_in_Vector_Space.
|
[11] |
LE H T,CERISARA C,DENIS A.Do convolutional networks need to be deep for text classification?[EB/OL].[2018-03-11].https://arxiv.org/abs/1707.04108.
|
[12] |
ER M J,ZHANG Yong,WANG Ning,et al.Attention pooling-based convolutional neural network for sentence modelling[J].Information Sciences,2016,373:388-403.
|
[13] |
Contagiodump blog[EB/OL].[2018-03-11].http://contagiodump.blogspot.com.
URL
|
[14] |
Malware capture facility project[EB/OL].[2018-03-11].http://mcfp.weebly.com.
URL
|
[15] |
Pcapanalysis[EB/OL].[2018-03-11].http://www.pcapanalysis.com.
URL
|
[16] |
ZHANG H,PAPADOPOULOS C.BotTalker:generating encrypted,customizable C&C traces[C]//Proceedings of IEEE International Symposium on Technologies for Homeland Security.Washington D.C.,USA:IEEE Press,2015:1-6.
|
[17] |
FireEye.magniber ransomware wants to infect only the right people[EB/OL].[2018-03-11].https://www.fireeye.com/blog/threat-research/2017/10/magniber-ransomware-infects-only-the-right-people.html.
|